#16 Implement Certificate Fingerprinting

باز‌کردن
4 سال پیش باز شده توسط stan · 1 دیدگاه

We should have the VEN print their own certificate's fingerprint on startup (if a certificate is provided), which can be shared with the VTN to identify the VEN.

From the OpenADR documentation:

import ssl, hashlib
bin_cert = ssl.PEM_cert_to_DER_cert( open('client_cert.pem').read() )
sha_hash = hashlib.sha256(bin_cert).digest()
print ':'.join( '%02X' % ord(c) for c in sha_hash[-10:])
We should have the VEN print their own certificate's fingerprint on startup (if a certificate is provided), which can be shared with the VTN to identify the VEN. From the OpenADR documentation: ```python import ssl, hashlib bin_cert = ssl.PEM_cert_to_DER_cert( open('client_cert.pem').read() ) sha_hash = hashlib.sha256(bin_cert).digest() print ':'.join( '%02X' % ord(c) for c in sha_hash[-10:]) ```
Stan Janssen نظر 4 سال پیش
مالک

This also means that the opposing party should be able to use the certificate fingerprint (instead of the certificate itself) to authenticate the incoming messages.

This also means that the opposing party should be able to use the certificate fingerprint (instead of the certificate itself) to authenticate the incoming messages.
برای پیوستن به گفتگو، وارد شودید.
بدون برچسب
بدون نقطه عطف
بدون مسئول رسیدگی
1 مشارکت کننده
درحال بارگذاری...
لغو
ذخيره
هنوز محتوایی ایجاد نشده.